Multi-tier authentication approach for ATMS

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    ATM has become insecure since incredible increase of trendy crimes related to this. Currently, ATM authentication is insecure, use no more than an access card with a PIN for verification. This research looked into the development of a multi-tier authentication approach that inte-grates more than one mechanism in the identity verification process used in ATMs. Recently biometric identification techniques have be-come popular such as facial recognition and fingerprint recognition. It has made significant efforts to rescue the insecure situation at the ATM points. These days Pattern Drawing is also one of the most growing security mechanisms. The combined authentication approach is to serve the purpose both the identification and authentication that card and PIN do in recent years. Proposed plan includes face recognition, fingerprint and pattern drawing together as layers. As far as security concerns proposed approach shows four times better performance than the existing approach in real environments.

     

     


  • Keywords


    ATM; Facial Recognition; Fingerprint Recognition; Pattern Drawing; PIN.

  • References


      [1] The ATM Forum Technical Committee, ATM Security Framework 1.0, AF-SEC-0096.000, February 1998.

      [2] S.S.Das and Debbarma, "Designing a Biometric Stradegy fingerprint Measure for enhancing ATM Security in Indian e-banking system", International Journal of Information and Communication Technology Research, Volume.1,No.5,pp.197-203, (2011).

      [3] Jain A.K, Ross A. and Prabhakar S, "An Introduction to Biometric Recognition", IEEE Transactions on Circuits and Systems for Video Technology, 14, 4-20, 2009. https://doi.org/10.1109/TCSVT.2003.818349.

      [4] Ross, A., & Jain, A., "Information fusion in biometrics", Pattern recognition letters, 24(13), 2115-2125, (2003). https://doi.org/10.1016/S0167-8655(03)00079-5.

      [5] Jain, A. K., Ross, A., & Prabhakar, S., "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4-20, (2004). https://doi.org/10.1109/TCSVT.2003.818349.

      [6] Faundez-Zanuy, M., "Data fusion in biometrics", IEEE Aerospace and Electronic Systems Magazine, 20(1), 34-38, (2005). https://doi.org/10.1109/MAES.2005.1396793.

      [7] Chang, K., Bowyer, K. W., Sarkar, S., & Victor, B., "Comparison and combination of ear and face images in appearance-based biometrics", IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(9), 1160-1165, (2003). https://doi.org/10.1109/TPAMI.2003.1227990.

      [8] Mansfield, A. J., & Wayman, J. L., Best practices in testing and reporting performance of biometric devices, Teddington, Middlesex, UK: Centre for Mathematics and Scientific Computing, National Physical Laboratory, 2002.

      [9] Deane, F., Barrelle, K., Henderson, R., & Mahar, D., "Perceived acceptability of biometric security systems", Computers & Security, 14(3), 225-231, (1995). https://doi.org/10.1016/0167-4048(95)00005-S.

      [10] Derawi, M. O., Nickel, C., Bours, P., & Busch, C., "Unobtrusive user authentication on mobile phones using biometric gait recognition", 2010 Sixth International Conference on in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), (2010).

      [11] Salah, A. A., Bicego, M., Akarun, L., Grosso, E., & Tistarelli, M.,"Hidden Markov Model-based face recognition using selective attention", International Society for Optics and Photonics in Electronic Imaging 2007,(2007).

      [12] Chrissikopoulos, M. P. E. M. V., & Alexandris, N., "Secure fingerprint verification based on image processing segmentation using computational geometry algorithms", ACTA Press, (2003).


 

View

Download

Article ID: 15176
 
DOI: 10.14419/ijet.v7i4.15176




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.